CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more...

The program is currently available to consultants, influencers or executive level contributors.

amsterdam-bank

This Amsterdam Bank Wants To Hack … Itself?

Bank Wants To Hack … Itself?

With instances of professional hacking and data leaks making the news every year, it’s no secret that cybersecurity has become a major concern. How does a corporation ensure its cybersecurity remains impenetrable in a world of ever-advancing technology?

By hacking their own systems, of course.

The term’s known as penetration testing and it’s one of the more effective methods companies, financial groups and government agencies use to keep out unwanted digital penetration.

This technique of internal security testing has been used in the past, but it generally consisted of testing the physical security of a location.

In this day and age, with the tremendous value of digital data and currency, the threat of hacking has grown into a billion-dollar security issue. A perfect example of this would be the precautions set in place by the central bank of the Netherlands.

DNB Cyber Initiative

De Nederlandsche Bank, or DNB, has recently announced its intention to create a team of cybersecurity experts and hackers. Aimed at attacking the country’s financial infrastructure in order to test and improve its defenses, the attacks will be carried out in secret, targeting various banks, markets and clearinghouses.

The program will provide insight into the current state of cybersecurity the Netherlands possesses and also reveal whether or not an entire financial market can be built on a blockchain.

Program Details

According to reports from within the DNB, the cyberprogram, also known as Tiber, will consists of a red team, a white team and a blue team.

The red team will be supervised by the DNB and tasked with hacking into the various financial institutions.

The white team will be alerted to the cyberattack and is responsible for observing the encounter.

The blue team will be responsible for discovering the cyberhack, tracking it and blocking the attempt on their system.

Overall Purpose

For the Netherlands, this project will not only help identify the weaknesses of the country’s infrastructure, but it will also help justify new methods of securing the internal operations of their financial market infrastructures.

While most financial institutions have their own security measures in place, the practice of self-hacking could serve as a proactive measure against hackers who do nothing but find and exploit security vulnerabilities.

Identifying Vulnerabilities First

By the time a system has been hacked and compromised, it’s too late to do anything of real substance. Even if the hacks stopped and the infiltrator gets kicked out of the system, there’s no other option but to go through the entire system and search for residual threats.

Meanwhile, if the hack succeeds, then the entire system will be compromised — not only at that moment but also in the future. Any hacker that has taken a look at a system once will have identified several other entry points for further exploitation.

Discovering these vulnerabilities before a malicious hacker can use them not only protects the system, it also strengthens future security capabilities.

Thinking of the Future

As stated above, professional hackers spend their time thinking up ways to bypass cybersecurities and safeguards. It’s because of this consistent threat that system checks and tests must be performed on a regular basis.

In the case of the DCB, a single breach can and will threaten not only the financial security of the Netherlands, but also of the European System of Central Banks.

For online businesses and major corporations, especially ones with prolific brands such as Twitter or Amazon, the threat of a cyberattack remains constant nearly every day of the year.

It’s better to be proactive that to be caught unprepared.

By Kayla Matthews

Kayla Matthews

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

View Website
The Lighter Side Of The Cloud - Application Forecaster
The Lighter Side Of The Cloud - Called The Fog
The Lighter Side Of The Cloud - Brain Cramp
The Lighter Side Of The Cloud - Company Strategy
The Lighter Side Of The Cloud - Apple Pay
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...
Protect Against Network Failures

Five Things Organizations Can Do To Protect Against Network Failures

Protect Against Network Failures It is no surprise that whenever there is an outage in a public or private cloud, ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape Mapping the customer journey is one of the biggest strategic shifts currently underway in the marketing industry ...
5 Simple Tips to Help Avoid Ransomware

5 Simple Tips to Help Avoid Ransomware

5 Tips to Avoid Ransomware Ransomware is a particularly pernicious form of malware: unsatiated by simply using your system as ...
Driving Transformation? It is possible to predict the future.

Driving Transformation? It is possible to predict the future.

Driving Transformation Previously, I wrote about the criticality of defining the Vision for your transformation - what is your real objective, how ...
The UK Tech Sector: The Gender Gap

The UK Tech Sector: The Gender Gap

The Tech Sector Gender Gap In conversation with Co-Founder and Creative Director of North West Web Design Studio, MadeByShape Andy ...
12 WordPress Managed Hosting Services

12 WordPress Managed Hosting Services

WordPress Hosting Services WordPress hosting services has exploded in popularity as a blogging tool and content management system in recent years, and is now used by more than 23.3 percent (2018 Edit: 53%) of the top 10 million websites worldwide. Due ...
12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help ...
real time hacking attacks

Live Real Time Hacking and Ransomware Tracking Maps Online

Real Time Hacking Attacks We've recently covered a few real time hacking maps but have decided to extend the list based on the recent ransomware activities with some additional real time hacking attack and ransomware tracking maps. Ransomware refers to malicious ...
Automate Service Management

[Free eBook] 150 Ways to Automate Service Management Throughout Your Organization…

Think about an IT Service Catalog as a supermarket of available services. Everyone in your company requests and delivers services from each other. From Human Resources and Marketing to Facilities and Procurement, each department is a service provider to the ...
Gartner’s Top 10 Predictions For IT In 2018 And Beyond

Gartner’s Top 10 Predictions For IT In 2018 And Beyond

Gartner’s Top 10 Predictions For IT In 2018 In 2020, AI will become a positive net job motivator, creating 2.3M jobs while eliminating only 1.8M jobs. By 2020, IoT technology will be in 95% of electronics for new product designs ...
Technology Certification Courses

Top Five Technology Certification Courses To Choose From In 2018

Technology Certification Courses Gartner predicts that the global public cloud services market is projected to grow by 55 percent in the next three years and is expected to reach $383.3 billion by the end of 2020. Today, cloud computing helps enterprises ...